XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Confluence. Starting in version 1.0 and prior to version 1.26.5, missing escaping of the width parameter in the column macro allows remote code execution for any user who can edit any page or who can access the CKEditor converter. The width parameter is used without escaping in XWiki syntax, thus allowing XWiki syntax injection which enables remote code execution when the macro has been installed by a user with programming right, or it at least allows executing Velocity code as the wiki admin. Version 1.26.5 contains a patch for the issue.
Metrics
Affected Vendors & Products
References
History
Thu, 11 Sep 2025 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Xwikisas
Xwikisas xwiki-pro-macros |
|
Vendors & Products |
Xwikisas
Xwikisas xwiki-pro-macros |
Wed, 10 Sep 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 09 Sep 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Confluence. Starting in version 1.0 and prior to version 1.26.5, missing escaping of the width parameter in the column macro allows remote code execution for any user who can edit any page or who can access the CKEditor converter. The width parameter is used without escaping in XWiki syntax, thus allowing XWiki syntax injection which enables remote code execution when the macro has been installed by a user with programming right, or it at least allows executing Velocity code as the wiki admin. Version 1.26.5 contains a patch for the issue. | |
Title | XWiki Remote Macros vulnerable to remote code execution from width parameter in the column macro | |
Weaknesses | CWE-95 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-09-09T18:31:08.108Z
Updated: 2025-09-10T14:14:06.852Z
Reserved: 2025-08-14T22:31:17.681Z
Link: CVE-2025-55727

Updated: 2025-09-10T14:13:54.615Z

Status : Awaiting Analysis
Published: 2025-09-09T19:15:56.587
Modified: 2025-09-11T17:14:25.240
Link: CVE-2025-55727

No data.